Henrich Christopher Pöhls
Orcid: 0000-0002-7256-0387Affiliations:
- University of Passau, Germany
According to our database1,
Henrich Christopher Pöhls
authored at least 62 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments.
Proceedings of the 23rd Workshop on Privacy in the Electronic Society, 2024
Proceedings of the Information Security Theory and Practice, 2024
Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme.
Proceedings of the Sicherheit, 2024
Viz<sup>4</sup>NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
2023
A Survey on Anonymous Communication Systems With a Focus on Dining Cryptographers Networks.
IEEE Access, 2023
Towards a Unified Abstract Architecture to Coherently and Generically Describe Security Goals and Risks of AI Systems.
Proceedings of the Security and Trust Management - 19th International Workshop, 2023
2022
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
TLS Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
2020
Dynamic Consent: Physical Switches and Feedback to Adjust Consent to IoT Data Collection.
Proceedings of the Distributed, Ambient and Pervasive Interactions, 2020
Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications.
Proceedings of the 2020 Global Internet of Things Summit, 2020
2019
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net.
J. Reliab. Intell. Environ., 2019
2018
Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures
PhD thesis, 2018
IACR Cryptol. ePrint Arch., 2018
The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018
C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 22nd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2017
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016
PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015
JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the Cyber Security and Privacy, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the 2014 IEEE Wireless Communications and Networking Conference Workshops, 2014
Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid.
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Aggregation and perturbation in practice: Case-study of privacy, accuracy & performance.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Why Showing One TLS Certificate is not Enough - Towards a Browser Feedback for Multiple TLS Certificate Verifications.
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions.
Proceedings of the 6th World Congress on Services, 2010
2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data.
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008
2006
Proceedings of the Smart Card Research and Advanced Applications, 2006